answersLogoWhite

0


Best Answer

Protocol

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What criteria could be used to prioritize traffic for all HTTPS transaction on a network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is a network traffic analyzer used for?

A network traffic analyzer is used for analyzing and monitoring the use of network traffic for many devices. Network Traffic Analyzer is also used to monitor the wireless network performance.


How VLAN reduces the network traffic?

yes, it reducing the network traffic


Which technology will prioritize traffic based upon the technical requirements of IP telephony?

Quality of Service will prioritize traffic based upon priority & will promote usage of Internet for other critical Services such as VOIP & Video Broadcasting.


How do you trace the network traffic?

Tracing network traffic requires a network monitor, protocol analyzer, or packet sniffer.


Which ethernet card can handle gigabit network traffic?

You would need the ethernet card can handle gigabit network traffic cable.


Which type of network traffic requires high reliability and security but can sustain a low bandwidth connection in a converged network?

"transactional traffic" is the righ answer.


What network device directs network traffic?

who do Kobe Bryant play for


What restricts traffic onto network?

Firewalls restricts traffic onto a network or onto an individual system. Firewalls can restrict users, web sites, and files from being moved across the network.


What are some of the most popular programs used to monitor a business's network traffic?

Some of the most popular programs which are used to monitor traffic within a business network include PRTG, Network Monitor, Network Eagle and Nagios.


How do you detect zombies in a network?

If you monitor traffic on computers on a network and find traffic occurring when no user is logged on, you probably have a zombie, especially when you are getting outbound traffic when no authorized used is actually using the system.